Vault Scanner can be used for:
-
Common header erros: - Clickjacking - jQuery - Insecure cookie flags - Session fixation through a cookie injection - Spoofing Agents - Brute force login through authorization header - Testing HTTP methods - Insecure headers
-
Collecting data: - Port scanning - Header grabbing - Banner grabbing - Finding comments in source code - Smartwhois scan - Check if error handling is done or not and extract the site data using that information. - OS scanning.
-
SSL scanner.
-
Crawl a website and collect all the URLs.
-
Scrape a website and collect all the images.
-
Shellshock checking.
Steps to setup :
git clone <your-fork-url>
cd vault_scanner
sudo apt-get install python3-pip
sudo pip3 install virtualenv
virtualenv venv
source venv/bin/activate
pip3 install -r requirements.txt
Starting Vault :
cd vault_scanner/src
python3 vault.py
usage: vault.py [-h] [-u URL] [-p] [-sp] [-ep] [-ssl] [-info] [-comment]
[-fuzz]
optional arguments:
-h, --help show this help message and exit
-u URL, --url URL URL for scanning
-p, --port Port for scanning
-sp, --start_port Start port for scanning
-ep, --end_port End port for scanning
-ssl perform SSL scan
-info Gather information
-comment Finding comments
-fuzz Fuzzing URL
Example Usage :
python3 vault.py -u 'http://url' -info -comment -ssl -fuzz